Chief executive officer and disgruntled employee

Assignment Help Basic Computer Science
Reference no: EM132719778

Chief Executive Officer and Disgruntled Employee

Personnel within an organization re-organized his computer workstation to match the organization chief executive officer (CEO's) internet protocol (IP) address, and fully utilized CEO IP address to send belligerent email messages, making messages to appear as if the CEO is the author of offensive messages.

In the process, the organization information technology security (ITS) team was notified and started monitoring all incoming and outgoing network traffic in an attempt to catch the perpetrator or the CEO, in action.

Without a shred of doubt, the CEO was the person of interest. Tactlessly, word of the investigation leaked out within the organization and the perpetrator withdraw from repeating offensive messages.

Thank goodness, information gathered from a router early in the investigation showed that the CEO's IP address is provisionally associated with the Media Access Control (MAC) address of another computer workstation within the organization.

The discovered MAC address used to locate the antisocial computer workstation belongs to a one of the disgruntled active employees who is a member of software development department within the organization.

Persistent investigation reveals that the disgruntled employee's computer workstation is involved in this unlawful and criminal operation.

Question-1

Absolutely, there was no external malefactor; then, which component of the social engineering attack (SEA) is involved in Chief Executive Officer and Disgruntled Employee operation?

Monitoring all incoming and outgoing network traffic to catch the perpetrator was not a smooth sailing operation without active involvement of information technology security (ITS) team.

Question-2

Do you agree that the digital forensic investigator must seek assistance from the organization ITS team to fully exonerate the CEO?

Question-3

Do you the hopeful digital forensic investigators accept that that digital forensic investigators must go through bi-annual training on TCP/IP and the Open System Interconnection (OSI) reference model to battle uncertainty in the crime scene?

If Yes, provide a comprehensive narrative to support your assertion.

Reference no: EM132719778

Questions Cloud

What is the rate of markdown at the sale price : What is the rate of markdown at the sale price? A furniture supplier lists a dining room set for $1,800 and offers trade discounts of 25%
How applying for the pro bono work done without jeopardizing : Titian is a management accountant specialised. Explain how applying for the pro bono work could be done without jeopardizing these two ethical standards.
Critically reflect on the core stages of mental health : Analyse evidence-informed, practice-based contemporary issues of mental health for diverse individuals and diverse backgrounds
How the company use of a post audit would help to prevent : The proposal would otherwise have been rejected. Explain how the company's use of a post audit would help to prevent this type of unethical behavior.
Chief executive officer and disgruntled employee : Personnel within an organization re-organized his computer workstation to match the organization chief executive officer (CEO's) internet protocol (IP) address,
Explain the production process with buffer stocks : a) Define buffer stock. Explain the production process with buffer stocks.
Operational excellence in any field of human endeavor : Discuss at least two trends or best practices related to key concepts and principles of operational excellence in any field of human endeavor
Commodity calls for demand of another commodity : State factors that may affect the geographical mobility of labour.
How to calculate the company accounts receivable turnover : How to Calculate the company's accounts receivable turnover ratio and the average collection period for accounts receivable in days.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  List the student number

A database records information about tutorials in a particular unit offering (such as ICT285 this semester). A student is supposed to attend only one of several available tutorials, each of which is taken by a tutor at a particular day and time. A..

  The technologies used to implement them

Q1: Describe WMANs, the technologies used to implement them, and where they are predominantly used Q2: What should be included in the narrative of a site survey report? Q3: Explain how an attacker can force a renegotiation to capture an SSID, even th..

  Write the declaration for this array in three different ways

The string of characters "GoodƒMorning" is to be stored in a character array named goodstr1. Write the declaration for this array in three different ways.

  Hospital appointment reservation system

Princess Marie-Lassie Memorial Hospital is a distinguished medical group practice of approximately 100 doctors and it is located in a major urban area.

  Amount per capita spending for health care

If this amount increased by 7 percent a year, what would be the amount per capita spending for health care in 14 years?

  Managing files and the world of windows

Take a position on whether or not standardization and naming conventions are critical for properly managing files and folders in a Windows environment.

  Population characteristic or a statistic

For each of the following statements, identify the number that appears in boldface type as the value of either a population characteristic or a statistic:

  Estimate the maximum aggregate i/o transfer rate

A 32-bit computer has two selector channels and one multiplexor channel. Each selector channels supports two magnetic disk and two magnetic tape units. The multiplexor channel has two line printers, two card readers, and 10 VDT terminals connected..

  Probability distribution of the random variable

Find the probability distribution of the random variable X. Find the expected value of the random variable X. Find the standard deviation of the random variable X.

  What are the pros and cons of cloud computing

What are the pros and cons of cloud computing? How do companies that enter cloud technology agreements pass on those issues to their customers?

  Evaluating options and developing resolutions

Provide an overview of tasks and key work activities (meetings, training, presentations, etc.) in which you were engaged during the week, with sufficient detail for your instructor to understand what you were involved in.

  Determining the interest payment paid

The bond was sold for $841,031. Also - 123 Inc.'s CEO just attended a corporate finance seminar and learned about bond yields, she would like you to calculate the yield that her company's bonds' offer.  Hint: you need to show the journal entries r..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd